Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-02-2023 09:58
Static task
static1
Behavioral task
behavioral1
Sample
d573bfc4f8016b5762aac81d5ea2c1fbcd402d70139482fc9b3e19daf3800e03.dll
Resource
win7-20230220-en
windows7-x64
5 signatures
150 seconds
General
-
Target
d573bfc4f8016b5762aac81d5ea2c1fbcd402d70139482fc9b3e19daf3800e03.dll
-
Size
1.4MB
-
MD5
19e6817b2fa1bae0e9e7cca721549835
-
SHA1
91b66dd16e72111b478767ae0e5837988f50166b
-
SHA256
d573bfc4f8016b5762aac81d5ea2c1fbcd402d70139482fc9b3e19daf3800e03
-
SHA512
998adf86dd8380b8fc3daf28328e369e06fbeb30ecdc91650880d01549c971e3cf4613e5806345672c3acd59376e65e63437f201a8bd70b17013d2a6e24c3f32
-
SSDEEP
24576:EWaBswTAEoKwlTD82CJy4VInpmVCfixrWxITZHCALkl4Njkiu2XOx2jo7dmPtzPD:+BsUAEvw435VInksQoIdHCkdG2X1oJCc
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1996-54-0x0000000010000000-0x00000000103C5000-memory.dmp family_blackmoon -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1996 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 1996 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2024 wrote to memory of 1996 2024 rundll32.exe rundll32.exe PID 2024 wrote to memory of 1996 2024 rundll32.exe rundll32.exe PID 2024 wrote to memory of 1996 2024 rundll32.exe rundll32.exe PID 2024 wrote to memory of 1996 2024 rundll32.exe rundll32.exe PID 2024 wrote to memory of 1996 2024 rundll32.exe rundll32.exe PID 2024 wrote to memory of 1996 2024 rundll32.exe rundll32.exe PID 2024 wrote to memory of 1996 2024 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d573bfc4f8016b5762aac81d5ea2c1fbcd402d70139482fc9b3e19daf3800e03.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d573bfc4f8016b5762aac81d5ea2c1fbcd402d70139482fc9b3e19daf3800e03.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
PID:1996